Skip to main content

CNS

 



CRYPTOGRAPHY AND NETWORK SECURITY (CNS)


Unit I to V Click Here




SYLLABUS

UNIT – I

Security Concepts: Introduction, The need for security, Security approaches, Principles of
security, Types of Security attacks, Security services, Security Mechanisms, A model for
Network Security
Cryptography Concepts and Techniques: Introduction, plain text and cipher text,
substitution techniques, transposition techniques, encryption and decryption, symmetric and
asymmetric key cryptography, steganography, key range and key size, possible types of
attacks.

UNIT – II

Symmetric key Ciphers: Block Cipher principles, DES, AES, Blowfish, RC5, IDEA, Block
cipher operation, Stream ciphers, RC4.
Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm, Elgamal
Cryptography, Diffie-Hellman Key Exchange, Knapsack Algorithm.

UNIT – III

Cryptographic Hash Functions: Message Authentication, Secure Hash Algorithm (SHA-
512), Message authentication codes: Authentication requirements, HMAC, CMAC, Digital
signatures, Elgamal Digital Signature Scheme.
Key Management and Distribution: Symmetric Key Distribution Using Symmetric &
Asymmetric Encryption, Distribution of Public Keys, Kerberos, X.509 Authentication
Service, Public – Key Infrastructure

UNIT – IV

Transport-level Security: Web security considerations, Secure Socket Layer and Transport
Layer Security, HTTPS, Secure Shell (SSH)
Wireless Network Security: Wireless Security, Mobile Device Security, IEEE 802.11
Wireless LAN, IEEE 802.11i Wireless LAN Security

UNIT – V

E-Mail Security: Pretty Good Privacy, S/MIME IP Security: IP Security overview, IP
Security architecture, Authentication Header, Encapsulating security payload, Combining
security associations, Internet Key Exchange
Case Studies on Cryptography and security: Secure Multiparty Calculation, Virtual
Elections, Single sign On, Secure Inter-branch Payment Transactions, Cross site Scripting
Vulnerability.


TEXT BOOKS:
1. Cryptography and Network Security - Principles and Practice: William Stallings,
Pearson Education, 6
th Edition

2. Cryptography and Network Security: Atul Kahate, Mc Graw Hill, 3rd
Edition

REFERENCE BOOKS:
1. Cryptography and Network Security: C K Shyamala, N Harini, Dr T R Padmanabhan,
Wiley India, 1st Edition.
2. Cryptography and Network Security : Forouzan Mukhopadhyay, Mc Graw Hill, 3rd
Edition
3. Information Security, Principles, and Practice: Mark Stamp, Wiley India.
4. Principles of Computer Security: WM. Arthur Conklin, Greg White, TMH
5. Introduction to Network Security: Neal Krawetz, CENGAGE Learning
6. Network Security and Cryptography: Bernard Menezes, CENGAGE Learning

Cryptography_and_Network Security_Principles_and _Practice_Sixth Edition_William Stallings

Text Book - Click Here 


Cryptography-Network-Security-Atul-Kahate

Text Book - Click Here 

Comments

Popular posts from this blog

DESIGN AND ANALYSIS OF ALGORITHMS – QUESTION BANK (CSE)

   ISL   ENGINEERING   COLLEGE DEPARTMENT   OF   COMPUTER   SCIENCE   AND   ENGINEERING DESIGN   AND   ANALYSIS   OF   ALGORITHMS QUESTION   BANK                                         BE III Year II Semester (A & B Sections) –PC 603 CS     Academic   Year: 2020-21 SHORT   ANSWER   QUESTIONS   UNIT-I 1.        Why   is an algorithm analysis required? 2.        State   about   UNION &   FIND   operations. 3.        List   out   the   UNION   algorithm   using   weighting   rule. 4.        Given   f(n)=10n 2 +4n+3,   then   prove   that   f(n)=O(n 2 ). 5.  ...

Cryptography and Network Security (CNS)

  CRYPTOGRAPHY AND NETWORK SECURITY (CNS) Unit I to V  Click Here Attacks on Computers and Computer Security SYLLABUS UNIT – I Security Concepts : Introduction, The need for security, Security approaches, Principles of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network Security Cryptography Concepts and Techniques : Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, steganography, key range and key size, possible types of attacks. UNIT – II Symmetric key Ciphers : Block Cipher principles, DES, AES, Blowfish, RC5, IDEA, Block cipher operation, Stream ciphers, RC4. Asymmetric key Ciphers : Principles of public key cryptosystems, RSA algorithm, Elgamal Cryptography, Diffie-Hellman Key Exchange, Knapsack Algorithm. UNIT – III Cryptographic Hash Functions : Message Authentication, Secure Hash Algorithm (SHA- 512), Message auth...

Introduction

  Welcome to Best Information for Learners and Job Seekers. Here you can find the best videos related to education and new technologies in the market as well as Govt. and Private Jobs. In this blog I am passing the information to users for user betterment to find the Education Material, Videos, Jobs and Others. Subscribe the You Tube Channel for E-learning Courses. PATHAN AHMED KHAN M.Tech.(Ph.D.)  Assistant Professor ISL Engineering College Mobile No: 0091-8019309323 email id: pathan.ahmed0504@gmail.com                 pathansknowledgehub@gmail.com